Dr. Kim graduated from the Fac Evangelica De Med Do Parana, Curitiba, Pr, Brazil in 1984. She works in Milwaukee, WI and 1 other location and specializes in Psychiatry. Dr. Kim is affiliated with Aurora Memorial Hospital Burlington and Aurora Psychiatric Hospital.
Mt Vernon Rehabilitation Medicine Associates 2501 Parkers Ln, Alexandria, VA 22306 (703)6647189 (phone), (703)6647568 (fax)
Languages:
English Spanish
Description:
Dr. Kim works in Alexandria, VA and specializes in Physical Medicine & Rehabilitation. Dr. Kim is affiliated with Inova Fair Oaks Hospital, Inova Fairfax Medical Campus and Inova Mount Vernon Hospital.
International Business Machines Corporation - Armonk NY
International Classification:
G01D 1326
US Classification:
362 23, 362 85, 362253, 345161, 345168
Abstract:
A lighting source, such as a light emitting diode (LED), is incorporated into the shaft of the pointing device. There is a light shield over the exposed top of the pointing device preferably, backed with a conically shaped reflecting surface to direct the light outwardly and horizontally across the keyboard. The light is activated in a laptop by opening the cover to raise the pointing device to its normal operating position. The lighting function may be disabled when the pointer is raised if there is sufficient ambient lighting.
Multiple light emitting diodes (LEDs) capable of emitting light at different optical wavelengths are provided in a hand held device with switches for activating the LEDs separately or jointly. A matrix of radiant energy detectors are arrayed across a presentation screen at the display pixel locations of a screen. These radiant energy detectors are capable of distinguishing between the two radiant energy sources. A position location matrix is provided on the screen for detection where radiant energy is received from one or more of the radiant energy sources. Detection signal logic provides Boolean signals representative of which of the radiant energy signals is detected by the radiant energy detectors and control function logic responds to the position information and the Boolean signals to generate a cursor on a display screen and to manipulate display objects on the screen intercepted by the cursor.
Moon J. Kim - Wappingers Falls NY William G. White - Poughkeepsie NY
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 1100
US Classification:
714 4, 370217
Abstract:
Method, program product, and apparatus for providing a nondisruptive takeover by a backup adapter when an adapter from a group of adapters connecting a data processing system to a Local Area Network (LAN) fails. The adapters are arranged in one or more groups, with each group having at least two members, one member being a backup adapter in the idle state. Primitives, in accordance with the IEEE 802. 2 standard, are monitored for each adapter, and when a failure is detected, the Medium Access Control (MAC) address for that adapter is loaded in the backup adapter, and the backup adapter is placed in the active state to nondisruptively takeover for the failed adapter.
Query Routing Based On Feature Learning Of Data Sources
Youssef Drissi - Ossining NY, US Moon Ju Kim - Wappingers Falls NY, US Lev Kozakov - Stamford CT, US Juan Leon-Rodriquez - Danbury CT, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F017/30
US Classification:
707 3
Abstract:
Query routing is based on identifying the preeminent search systems and data sources for each of a number of information domains. This involves assigning a weight to each search system or data source for each of the information domains. The greater the weight, the more preeminent a search system or data source is in a particular information domain. These weights Wi{1=0, 1,2,. . . N] are computed through a recursive learning process employing meta processing. The meta learning process involves simultaneous interrogation of multiple search systems to take advantage of the cross correlation between the search systems and data sources. In this way, assigning a weight to a search system takes into consideration results obtained about other search systems so that the assigned weights reflect the relative strengths of each of the systems or sources in a particular information domain. In the present process, a domain dataset used as an input to query generator. The query generator extracts keywords randomly from the domain dataset.
Method And System For Searching A Multi-Lingual Database
Youssef Drissi - Ossining NY, US Moon Ju Kim - Wappingers Falls NY, US Lev Kozakov - Stamford CT, US Juan Leon Rodriguez - Pleasant Valley NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F017/30
US Classification:
707 3, 707 2, 707 7, 707 8, 707 9
Abstract:
A system and method of searching a database in which documents of different languages are included. The system includes a synonym or keyword dictionary which is bi-directional and allows for translation of keywords between a first language and other languages. The translated words keywords for the document are stored in an inverted index which is then used for searching, either in a selected language, a second language or in all languages, as determined by the user. This use of multiple searching and a translated synonym dictionary avoids the need for translation of the entire document and avoids inaccuracies which may result from translations.
Multi-Tiered Control Architecture For Adaptive Optical Networks, And Methods And Apparatus Therefor
Abdella Battou - Silver Spring MD, US Moon W. Kim - Pleasanton CA, US Anastasios Tzathas - Howell NJ, US David H. Walters - Rockville MD, US Mario F. Alvarez - Beachwood NJ, US David M. Brooks - Crofton MD, US I. Michael Mandelberg - Baltimore MD, US Chin J. Chen - Rockville MD, US
Assignee:
Lambda OpticalSystems Corporation - Reston VA
International Classification:
H04J 14/00
US Classification:
398 45, 398 50, 398 51, 398 54, 398 56
Abstract:
A hierarchical and distributed control architecture for managing an optical communications network. The architecture includes a line card manager level for managing individual line cards in an optical switch, a node manager level for managing multiple line cards in an optical switch/node, and a network management system level for managing multiple optical switches/nodes in a network. An event manager at the node manager level enables software components that are running at the node manager to register for and receive events, and to post events. The events may be triggered, e. g. , by a change in a status of the switch, or an alarm condition. Control architecture functionalities include signaling, routing, protection switching and network management. Furthermore, the network management function includes a topology manager, a performance manager, a connection manager, a fault detection manager, and a configuration manager.
Yurdaer N. Doganata - Chestnut Ridge NY, US Youssef Drissi - Ossining NY, US Moon J. Kim - Wappingers Falls NY, US Lev Kozakov - Stamford CT, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 17/00 G06F 15/18 G06F 11/00
US Classification:
707100, 706 21, 714 39, 707102
Abstract:
A method, system, and computer program product for associating events. A provided event dataset includes events occurring in each of N successive time intervals (N≧3). Association rules pertaining to successive events in the event dataset are deduced. Sequences of events are generated from the association rules. Clusters of the sequences of events are formed. Sequences of the clusters are created. The clusters of the sequences may be used: to identify at least one event occurring in a time interval of the N time intervals as being a probable cause of at least one event occurring in a later-occurring time interval of the N time intervals; or to predict an occurrence of at least one event in a time interval occurring after the N time intervals, wherein the at least one event had occurred within the N time intervals.
System And Method For Telephonic Voice Authentication
Moon J. Kim - Wappingers Falls NY, US Marc Segre - Raleigh NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04M 1/64
US Classification:
379 8802, 704246, 704273
Abstract:
A voice biometric authentication system and method. An authentication system is provided for authenticating a user of a telephonic device, comprising: a setup system for capturing and storing an authentic user voice sample; a comparison system that compares the authentic user voice sample with an inputted voice sample and generates a comparison result; and a control system for controlling access to the telephonic device, wherein the control system: analyzes the comparison result for an initial inputted voice sample received when a telephone call is initiated; and periodically analyzes comparison results for ongoing inputted voice samples received during the telephone call.